Umpiring security Models for MANETS
In wireless mobile ad hoc networks, packet delivery is achieved through two closely related network-layer operations: ad hoc routing and packet forwarding. As a result any security solution should encompass the protection of both. Protecting the network layer operations such as routing the control m...
Guardado en:
Autor principal: | |
---|---|
Formato: | Articulo Revision |
Lenguaje: | Inglés |
Publicado: |
2012
|
Materias: | |
Acceso en línea: | http://sedici.unlp.edu.ar/handle/10915/9713 http://journal.info.unlp.edu.ar/wp-content/uploads/JCST-Apr12-TO1.pdf |
Aporte de: |
id |
I19-R120-10915-9713 |
---|---|
record_format |
dspace |
institution |
Universidad Nacional de La Plata |
institution_str |
I-19 |
repository_str |
R-120 |
collection |
SEDICI (UNLP) |
language |
Inglés |
topic |
Informática Wireless communication Cellular architecture (e.g., mobile) Security and Protection |
spellingShingle |
Informática Wireless communication Cellular architecture (e.g., mobile) Security and Protection Kathirvel, Ayyaswamy Umpiring security Models for MANETS |
topic_facet |
Informática Wireless communication Cellular architecture (e.g., mobile) Security and Protection |
description |
In wireless mobile ad hoc networks, packet delivery is achieved through two closely related network-layer operations: ad hoc routing and packet forwarding. As a result any security solution should encompass the protection of both. Protecting the network layer operations such as routing the control messages and data packet forwarding, from malicious attacks is an important and challenging issue in both wired and wireless mobile networks and the issue becomes even more challenging in the case of wireless mobile ad hoc network. Malicious nodes may disrupt routing algorithms by transmitting a false hop count; by dropping data packets and by routing the packets through unintended routes and so on. The work presented in this thesis attempts to improve the performance of wireless mobile ad hoc networks by protecting the network layer. Five studies are presented. |
format |
Articulo Revision |
author |
Kathirvel, Ayyaswamy |
author_facet |
Kathirvel, Ayyaswamy |
author_sort |
Kathirvel, Ayyaswamy |
title |
Umpiring security Models for MANETS |
title_short |
Umpiring security Models for MANETS |
title_full |
Umpiring security Models for MANETS |
title_fullStr |
Umpiring security Models for MANETS |
title_full_unstemmed |
Umpiring security Models for MANETS |
title_sort |
umpiring security models for manets |
publishDate |
2012 |
url |
http://sedici.unlp.edu.ar/handle/10915/9713 http://journal.info.unlp.edu.ar/wp-content/uploads/JCST-Apr12-TO1.pdf |
work_keys_str_mv |
AT kathirvelayyaswamy umpiringsecuritymodelsformanets |
bdutipo_str |
Repositorios |
_version_ |
1764820492390236162 |